CISM Certified Information Security Manager – Question0266

Which of the following would BEST address the risk of data leakage?

A.
File backup procedures
B. Database integrity checks
C. Acceptable use policies
D. Incident response procedures

Correct Answer: C

Explanation:

Explanation: Acceptable use policies are the best measure for preventing the unauthorized disclosure of confidential information. The other choices do not address confidentiality of information.